subject

As an investigator, you are charged with creating a timeline of a user's Internet activity on a company computer. When going into the user's temporary Internet files, you see that the directory is empty. You know that the company has a policy restricting the person from seeing hidden directories on the system, so it is unlikely that they were able to delete them. How is it possible that this directory is empty?
A. The user is implementing a rootkit that bypasses system security and gives them access to the directory.
B. The user has configured Internet Explorer to delete the history every time she logs off.
C. The user has selected the box in Temporary Internet Files and History that says, "Every time I start Internet Explorer."
D. This isn't possible. IE always stores cached files permanently.

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 04:30
Eye injuries usually occur as a result of all of the following things, except: a) proper machine operation b) battery explosion c) falling or flying debris d) electric welding arc
Answers: 2
question
Computers and Technology, 23.06.2019 05:00
In cell b18, enter a formula to calculate the amount budgeted for meals. this amount is based on the daily meal allowance and the total travel days (# of nights+1).
Answers: 1
question
Computers and Technology, 23.06.2019 12:00
If you embed a word table into powerpoint, what happens when you make edits to the embedded data? a. edits made to embedded data change the data in the source file; however, edits made to the source file will not be reflected in the embedded data. b. edits made to embedded data will change the data in the source file, and edits made to the source file will be reflected in the embedded data. c. edits made to embedded data don't change the data in the source file, nor will edits made to the source file be reflected in the embedded data. d. edits made to embedded data don't change the data in the source file; however, edits made to the source file will be reflected in the embedded data.
Answers: 1
question
Computers and Technology, 24.06.2019 18:30
What is the local portion of the e-mail address below? [email protected] a.) @ b.) biz c.) gumchewer d.) twrigley
Answers: 1
You know the right answer?
As an investigator, you are charged with creating a timeline of a user's Internet activity on a comp...
Questions
question
History, 15.04.2021 23:10
question
History, 15.04.2021 23:10
question
Mathematics, 15.04.2021 23:10
question
Mathematics, 15.04.2021 23:10
Questions on the website: 13722362